httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From m..@apache.org
Subject cvs commit: httpd-site/xdocs index.xml
Date Wed, 19 Jun 2002 14:18:28 GMT
mjc         2002/06/19 07:18:28

  Modified:    docs     index.html
               xdocs    index.xml
  Log:
  There is no longer a need for this comment; ISS are pointing to us for
  updates rather than pushing their patch and this just adds confusion.
  All the history is covered in enough news articles (and some of them are
  not too far off the mark) that we don't need to get into it here.
  
  Revision  Changes    Path
  1.30      +0 -3      httpd-site/docs/index.html
  
  Index: index.html
  ===================================================================
  RCS file: /home/cvs/httpd-site/docs/index.html,v
  retrieving revision 1.29
  retrieving revision 1.30
  diff -u -r1.29 -r1.30
  --- index.html	18 Jun 2002 18:26:57 -0000	1.29
  +++ index.html	19 Jun 2002 14:18:27 -0000	1.30
  @@ -90,9 +90,6 @@
   remote attacker launch a denial of service attack as the parent process
   will eventually have to replace the terminated child process, and starting
   new children uses non-trivial amounts of resources.</p>
  -<p>We were also notified today by ISS that they had published the same issue
  -which has forced the early release of this advisory.  Please note that the
  -patch provided by ISS does not correct this vulnerability.</p>
   <p>The Apache Software Foundation has released versions 1.3.26 and 2.0.39
   to address and fix this issue.  These version are available for download;
   see below.</p>
  
  
  
  1.19      +0 -4      httpd-site/xdocs/index.xml
  
  Index: index.xml
  ===================================================================
  RCS file: /home/cvs/httpd-site/xdocs/index.xml,v
  retrieving revision 1.18
  retrieving revision 1.19
  diff -u -r1.18 -r1.19
  --- index.xml	18 Jun 2002 18:26:57 -0000	1.18
  +++ index.xml	19 Jun 2002 14:18:28 -0000	1.19
  @@ -40,10 +40,6 @@
   will eventually have to replace the terminated child process, and starting
   new children uses non-trivial amounts of resources.</p>
   
  -<p>We were also notified today by ISS that they had published the same issue
  -which has forced the early release of this advisory.  Please note that the
  -patch provided by ISS does not correct this vulnerability.</p>
  -
   <p>The Apache Software Foundation has released versions 1.3.26 and 2.0.39
   to address and fix this issue.  These version are available for download;
   see below.</p>
  
  
  

Mime
View raw message